WP Router Security & Risk Analysis

wordpress.org/plugins/wp-router

Provides a simple API for mapping requests to callback functions.

1K active installs v0.5 PHP + WP 3.0+ Updated Aug 6, 2012
callback-functionsurl-mapping
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Router Safe to Use in 2026?

Generally Safe

Score 85/100

WP Router has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The 'wp-router' plugin version 0.5 exhibits a generally positive security posture based on the provided static analysis. There are no identified direct entry points like AJAX handlers, REST API routes, or shortcodes that are exposed to the public without authentication or permission checks. The absence of dangerous functions, file operations, and external HTTP requests is also a strong indicator of secure coding practices. Furthermore, all SQL queries utilize prepared statements, which is a critical defense against SQL injection vulnerabilities. The plugin also avoids bundling external libraries, simplifying its security management.

However, there are a couple of areas that warrant attention. The presence of output that is not properly escaped presents a potential Cross-Site Scripting (XSS) risk, albeit with only 50% of outputs being problematic. More concerning is the taint analysis, which identified one flow with an unsanitized path. While no critical or high severity issues were flagged in the taint analysis, an unsanitized path can be a precursor to more serious vulnerabilities if it involves user-supplied data. The plugin's vulnerability history is clean, with no recorded CVEs, which is a positive sign but should not lead to complacency. The lack of nonce and capability checks on any potential entry points (though zero are identified here) is a noted observation, but less impactful given the zero attack surface.

In conclusion, 'wp-router' v0.5 appears to be a relatively secure plugin, with significant strengths in its handling of database interactions and its limited attack surface. The primary concerns lie with the potential for XSS due to unescaped output and the single identified unsanitized path in the taint analysis. Addressing these specific code quality issues would further enhance its security.

Key Concerns

  • Unescaped output detected
  • Flow with unsanitized path detected
Vulnerabilities
None known

WP Router Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Router Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

50% escaped2 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
login_redirect (WP_Route.class.php:262)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Router Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 15
actioninitwp-router.php:49
actionadmin_headwp-router.php:58
actioninitWP_Router.class.php:123
actionparse_requestWP_Router.class.php:124
filterrewrite_rules_arrayWP_Router.class.php:125
filterquery_varsWP_Router.class.php:126
actionpre_get_postsWP_Router_Page.class.php:93
actionthe_postWP_Router_Page.class.php:94
filterthe_titleWP_Router_Page.class.php:95
filtersingle_post_titleWP_Router_Page.class.php:96
filterredirect_canonicalWP_Router_Page.class.php:97
filterget_post_metadataWP_Router_Page.class.php:98
filterpost_type_linkWP_Router_Page.class.php:99
filtertemplate_includeWP_Router_Page.class.php:101
actionwp_router_generate_routesWP_Router_Sample.class.php:10
Maintenance & Trust

WP Router Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedAug 6, 2012
PHP min version
Downloads17K

Community Trust

Rating74/100
Number of ratings3
Active installs1K
Developer Profile

WP Router Developer Profile

Jonathan Brinley

6 plugins · 1K total installs

89
trust score
Avg Security Score
84/100
Avg Patch Time
1 days
View full developer profile
Detection Fingerprints

How We Detect WP Router

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-router/WP_Router_Sample.class.php

HTML / DOM Fingerprints

Data Attributes
name="WP_Route"
JS Globals
window.WP_Router
FAQ

Frequently Asked Questions about WP Router